{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T00:45:50Z","timestamp":1649033150684},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2011,6,16]],"date-time":"2011-06-16T00:00:00Z","timestamp":1308182400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1007\/s11623-011-0119-6","type":"journal-article","created":{"date-parts":[[2011,6,15]],"date-time":"2011-06-15T13:05:06Z","timestamp":1308143106000},"source":"Crossref","is-referenced-by-count":0,"title":["Der reale Wert einer IP-Adresse"],"prefix":"10.1007","volume":"35","author":[{"given":"Amir","family":"Alsbih","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,6,16]]},"reference":[{"key":"119_CR1","unstructured":"forsa Gesellschaft f\u00fcr Sozialforschung und statistische Analysen mbH. Meinungen der Bundesb\u00fcrger zur Vorratsdatenspeicherung. Juni 2008."},{"issue":"9","key":"119_CR2","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/s11623-009-0137-9","volume":"33","author":"Dirk Hensel","year":"2009","unstructured":"Hensel, Dirk. Die Vorratsdatenspeicherung aus datenschutzrechtlicher Sicht. Datenschutz und Datensicherheit. September 2009.","journal-title":"Datenschutz und Datensicherheit - DuD"},{"key":"119_CR3","doi-asserted-by":"crossref","unstructured":"Mamakos, L., et al. A Method for Transmitting PPP Over Ethernet (PPPoE). s.l.: RFC Editor, 1999.","DOI":"10.17487\/rfc2516"},{"key":"119_CR4","unstructured":"Cable Television Laboratories Research Consortium. DOCSIS Website. [Online] 2010. http:\/\/www.cablelabs.com\/cablemodem\/ ."},{"key":"119_CR5","unstructured":"Stealing The Internet: An Internet-Scale Man In The Middle Attack. Pilosov, Alex und Kapela, Tony. 2008. DEFCON 16."},{"key":"119_CR6","unstructured":"Prefix Hijacking Mitigation: Something is better than nothing. Cowie, James, et al. 2009. NANOG 46."},{"key":"119_CR7","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/B978-012088588-6\/50013-9","volume-title":"Network Routing","author":"Deepankar Medhi","year":"2007","unstructured":"Medhi, Deepankar und Ramasamy, Karthikeyan. Network routing: algorithms, protocols, and architectures. s.l.: Elsevier B.V., 2007."},{"key":"119_CR8","unstructured":"Hacking DOCSIS For Fun and Profit. Self, Blake und Bitemytaco. 2010. DEFCON 18."},{"key":"119_CR9","unstructured":"Rajkosto und SBHacker. Haxorware \u2014 Firmware for bcm3349 Cable Modems \u2014 sponsored by SBHacker.net. [Online] 2010. http:\/\/www.haxorware.com ."},{"key":"119_CR10","doi-asserted-by":"crossref","unstructured":"Albrecht, Hans-J\u00f6rg, Grafe, Adina und Kilchling, Michael. Rechtswirklichkeit der Auskunftserteilung \u00fcber Telekommunikationsverbindungsdaten nach \u00a7\u00a7 100g, 100h StPO. Max-Planck-Instituts f\u00fcr ausl\u00e4ndisches und internationales Strafrecht. 2008.","DOI":"10.30709\/978-3-86113-088-8"},{"key":"119_CR11","unstructured":"Bundesministerium der Justiz. \u00a7 113 Manuelles Auskunftsverfahren. 2010. Telekommunikationsgesetz vom 22. Juni 2004 (BGBl. I S. 1190), das zuletzt durch Artikel 2 des Gesetzes vom 17. Februar 2010 (BGBl. I S. 78) ge\u00e4ndert worden ist."},{"key":"119_CR12","unstructured":"Landgericht K\u00f6ln. Aktenzeichen: 109-1\/08. September 2008. http:\/\/www.justiz.nrw.de\/nrwe\/lgs\/koeln\/lg_koeln\/j2008\/109_1_08beschluss20080925.html ."},{"key":"119_CR13","unstructured":"Orebaugh, Angela, et al. Wireshark & Ethereal Network Protocol Analyzer Toolkit (Jay Beale\u2019s Open Source Security). s.l.: Syngress Publishing, 2007."},{"key":"119_CR14","unstructured":"Institute of Electrical and Electronics Engineers, Inc. IEEE-SA \u2014 Registration Authority. [Online] 2010. http:\/\/standards.ieee.org\/develop\/regauth\/oui\/public.html ."},{"key":"119_CR15","unstructured":"Coffer, Jason. MAC_Find: Vendor\/Ethernet\/Bluetooth MAC Address Lookup and Search. [Online] 2010. http:\/\/www.coffer.com\/mac_find ."},{"key":"119_CR16","unstructured":"Bundeskriminalamt. Polizeiliche Kriminalstatistik 2009: Bundesrepublik Deutschland. 2010. S. 32. http:\/\/www.bka.de\/pks\/pks2009\/ download\/pks-jb_2009_bka.pdf ."},{"key":"119_CR17","unstructured":"Mahnken, Eva. Mindestspeicherungsfristen f\u00fcr Telekommunikationsverbindungsdaten: Rechtstatsachen zum Beleg der defizit\u00e4nen Rechtslage. Bundeskriminalamt. 2005. S. 8."},{"key":"119_CR18","unstructured":"Terrorismus Reine Ressourcenverschwendung. Laufer, Cornelia. 2006, ZEIT online."},{"key":"119_CR19","unstructured":"DerEngel. Hacking the Cable Modem: What Cable Companies Don\u2019t Want You to Know. s.l.: No Starch Press, 2006."},{"key":"119_CR20","unstructured":"The Tor Project, Inc. Tor Project: Anonymity Online. [Online] 2010. https:\/\/www.torproject.org\/index.html.en ."},{"key":"119_CR21","unstructured":"JonDos GmbH. JonDonym \u2014 the anonymisation service. [Online] 2010. http:\/\/anonymousproxy-servers.net\/en ."},{"key":"119_CR22","unstructured":"Simonite, Tom. Tor im Router. [Online] Dezember 2010. http:\/\/www.heise.de\/tr\/artikel\/Tor-im-Router-1159154.html ."},{"key":"119_CR23","unstructured":"perfect-privacy.com. Perfect Privacy; Encrypts your Internet at Home and While Away on Business, SSH Tunnels, VPN, Anonymous High Security and Elite Squid, SOCKS 5 and CGI Proxies, Safe Offshore Servers on Different Continents. [Online] Dezember 2010. http:\/\/perfect-privacy.com ."},{"key":"119_CR24","unstructured":"Henning, Edward. Vint Cerf says a quarter of Internet PCs is part of a bot network. [Online] Januar 2007. http:\/\/www.heise.de\/newsticker\/meldung\/Vint-Cerf-Ein-Viertel-der-Internet-PCs-ist-Mitglied-eines-Bot-Netzes-138981.html ."},{"key":"119_CR25","unstructured":"Fossi, Marc, et al. Symantec Global Internet Security Threat Report: Trends for 2009. s.l.: Symantec Corporation, 2010. http:\/\/eval.symantec.com\/mktginfo\/enterprise\/white_papers\/b-whitepaper_internet_security_threat_ report_xv_04-2010.en-us.pdf ."},{"key":"119_CR26","unstructured":"Bundeskriminalamt. Polizeiliche Kriminalstatistik 2007: Bundesrepublik Deutschland. 2008. http:\/\/www.bka.de\/pks\/pks2007\/download\/pks-jb_2007_bka.pdf ."},{"key":"119_CR27","unstructured":"Rogers, Russ und Devost, Matthew G. Hacking a Terror Network: The Silent Threat of Covert Channels. s.l.: Syngress Publishing, 2004."},{"key":"119_CR28","unstructured":"Endres, Johannes. Beweismittel IP-Adresse fragw\u00fcrdig. [Online] heise Netze, April 2010. http:\/\/www.heise.de\/netze\/meldung\/Beweismittel-IP-Adresse-fragwuerdig-980685.html ."},{"key":"119_CR29","unstructured":"Bachfeld, Daniel. Per Anhalter durchs Internet. c\u2019t 13. 2004. http:\/\/www.heise.de\/ct\/artikel\/Per-Anhalter-durchs-Internet-289410.html ."},{"key":"119_CR30","unstructured":"Meyer, David. Pub \u2018fined \u2208xtsterling{}8k\u2019 for Wi-Fi copyright infringement. [Online] November 2009. http:\/\/www.zdnet.co.uk\/news\/networking\/2009\/11\/27\/pub-fined-8k-for-wifi-copyright-infringement-39909136 ."},{"key":"119_CR31","unstructured":"Br\u00fcderle spannt Bogen von Wikileaks zur Stasi. Finsterbusch, Stephan und Schilder, Peter. Dezember 2010, Frankfurter Allgemeine Zeitung GmbH."},{"key":"119_CR32","unstructured":"Brunst, Phillip. Die verlorene Heimlichkeit: Anonymit\u00e4t im Internet. Freiburg im Breisgau: Max-Planck-Gesellschaft zur F\u00f6rderung der Wissenschaften e.V., 2009."},{"key":"119_CR33","volume-title":"Challenges and Directions for Monitoring P2P File Sharing Networks","author":"M. Piatek","year":"2008","unstructured":"Piatek, Michael, Kohno, Tadayoshi und Krishnamurthy, Arvind. Challenges and Directions for Monitoring P2P File Sharing Networks. Washington: Dept. of Computer Science and Engineering, Univ. of Washington, 2008."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0119-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-011-0119-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0119-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0119-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,20]],"date-time":"2020-06-20T04:53:24Z","timestamp":1592628804000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-011-0119-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,16]]},"references-count":33,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2011,7]]}},"alternative-id":["119"],"URL":"https:\/\/doi.org\/10.1007\/s11623-011-0119-6","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,6,16]]},"article-number":"482"}}